selinux-policy-sandbox-35.5-6.oe2203 >  A bŗW^^fvuݗ=S?~ /E`Pmc>]3mXu%#U q3wo4EXBW KD%@|<a)f#W/k%Z${YРӔdjI> C@ ;/z^ {d9,1](_!σKYQCuz"N?qIn/Jg.Ϳtm5gL!.&xy{?{M477868b69b16475e4793cee2b8001e571dfb6a5a6ca7f9d2f1047f7926af9d20dbbc134845f8ed43c91e9c7a5fdb866e58bca308@bŗW^^f!NcI{gY ༺>E[(q Ct9P+Zr'Ô `:fFWUAZc1@vvӊⴹFp?~/917$E8=$A'DQVU jlO[#eWXamcq,!}EPd@j߬8LMQO'jXy<{xeQpA5?%d ' > 06=S    9 <@EJptK(89: >y?FGHIXY\]^bcdReWfZl\txu|vzCselinux-policy-sandbox35.56.oe2203SELinux policy sandboxSELinux sandbox policy used for the policycoreutils-sandbox packagebobs-worker1640081563-aarch64-0020WHuawei openEulerhttp://openeuler.orgGPLv2+http://openeuler.orgUnspecifiedhttps://github.com/fedora-selinux/selinux-policy/linuxnoarchrm -f /etc/selinux/*/modules/active/modules/sandbox.pp.disabled 2>/dev/null rm -f /var/lib/selinux/*/active/modules/disabled/sandbox 2>/dev/null semodule -n -X 100 -i /usr/share/selinux/packages/sandbox.pp if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; exit 0if [ $1 -eq 0 ] ; then semodule -n -d sandbox 2>/dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy fi; fi; exit 0Wbab3551228c2419e2ec2e163005a187232cb7323fc2492e7bdccc4f672970db25rootrootselinux-policy-35.5-6.oe2203.src.rpmselinux-policy-sandbox     /bin/sh/bin/shrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)selinux-policy-baseselinux-policy-targeted3.0.4-14.6.0-14.0-15.2-135.5-6.oe220335.5-6.oe22034.17.0bbbjb@b~aa@aA@a7T@a*%@a&0a@`]`9@` @``,`_@`B@_@_j_$_l@_i@_cO_Z@_H__@lujie - 35.5-6luhuaxin - 35.5-5luhuaxin - 35.5-4lujie42 - 35.5-3lujie42 - 35.5-2lujie42 - 35.5-1gaoyusong - 3.14.2-77lujie42 <572084868@qq.com> - 3.14.2-76lujie42 <572084868@qq.com> - 3.14.2-75lujie42 <572084868@qq.com> - 3.14.2-74lujie42 <572084868@qq.com> - 3.14.2-73mingyang -3.14.2-72lujie42 <572084868@qq.com> - 3.14.2-71luhuaxin <1539327763@qq.com> - 3.14.2-70luhuaxin <1539327763@qq.com> - 3.14.2-69luhuaxin <1539327763@qq.com> - 3.14.2-68luhuaxin <1539327763@qq.com> - 3.14.2-67luhuaxin <1539327763@qq.com> - 3.14.2-66luhuaxin <1539327763@qq.com> - 3.14.2-65luhuaxin <1539327763@qq.com> - 3.14.2-64openEuler Buildteam - 3.14.2-63luhuaxin <1539327763@qq.com> - 3.14.2-62openEuler Buildteam - 3.14.2-61openEuler Buildteam - 3.14.2-60openEuler Buildteam - 3.14.2-59openEuler Buildteam - 3.14.2-58openEuler Buildteam - 3.14.2-57openEuler Buildteam - 3.14.2-56steven - 3.14.2-55- Allow domain transition to sssd_t and role access to sssd- allow httpd to create files in /etc/httpd- add open permission to files_read_inherited_tmp_file- fix context of /usr/bin/rpmdb- selinux-requires macro shouldn't depend on policycoreutils-python- update selinux-policy-3.14.2 to selinux-policy-35.5-1- Fix CVE-2020-24612- set httpd_can_network_connect bool true- Add allow rasdaemon cap_sys_admin- Allow systemd hostnamed read udev runtime data- Add avc for systemd selinux page- Add qemu_exec_t for stratovirt- Add weak dep of selinux-policy-targeted- iptables.fc: Add missing legacy-restore and legacy-save entries- fix context of ebtables- backport some upstream patches backport-Allow-systemd-logind-dbus-chat-with-fwupd.patch backport-Allow-auditd-manage-kerberos-host-rcache-files.patch backport-Add-dev_lock_all_blk_files-interface.patch backport-Allow-systemd-machined-create-userdbd-runtime-sock-f.patch backport-Define-named-file-transition-for-sshd-on-tmp-krb5_0..patch backport-Allow-nsswitch_domain-to-connect-to-systemd-machined.patch backport-Allow-unconfined_t-to-node_bind-icmp_sockets-in-node.patch backport-Create-macro-corenet_icmp_bind_generic_node.patch backport-Allow-traceroute_t-and-ping_t-to-bind-generic-nodes.patch backport-Allow-passwd-to-get-attributes-in-proc_t.patch backport-Allow-login_pgm-attribute-to-get-attributes-in-proc_.patch backport-Allow-syslogd_t-domain-to-read-write-tmpfs-systemd-b.patch backport-Allow-all-users-to-connect-to-systemd-userdbd-with-a.patch backport-Add-new-devices-and-filesystem-interfaces.patch backport-Add-lvm_dbus_send_msg-lvm_rw_var_run-interfaces.patch backport-Allow-domain-write-to-an-automount-unnamed-pipe.patch backport-Allow-dyntransition-from-sshd_t-to-unconfined_t.patch backport-Allow-initrc_t-create-run-chronyd-dhcp-directory-wit.patch backport-Update-systemd_resolved_read_pid-to-also-read-symlin.patch backport-Allow-systemd-resolved-manage-its-private-runtime-sy.patch backport-Allow-systemd-logind-manage-init-s-pid-files.patch backport-Add-systemd_resolved_write_pid_sock_files-interface.patch backport-Allow-nsswitch-domain-write-to-systemd-resolved-PID-.patch backport-sysnetwork.if-avoid-directly-referencing-systemd_res.patch backport-Allow-stub-resolv.conf-to-be-a-symlink.patch backport-Allow-domain-stat-proc-filesystem.patch backport-Allow-domain-write-to-systemd-resolved-PID-socket-fi.patch backport-Allow-systemd-machined-manage-systemd-userdbd-runtim.patch backport-Allow-domain-stat-the-sys-filesystem.patch backport-Allow-login_userdomain-write-inaccessible-nodes.patch backport-Allow-local_login_t-get-attributes-of-tmpfs-filesyst.patch backport-Allow-dhcpc_t-domain-transition-to-chronyc_t.patch backport-Allow-nsswitch_domain-read-cgroup-files.patch backport-Allow-IPsec-and-certmonger-to-use-opencryptoki-servi.patch backport-Create-chronyd_pid_filetrans-interface.patch- allow kdump_t net_admin capability- allow rpcbind to bind all port- selinux_requires macro shouldn't depend on policycoreutils-python - add avc for allowing systemd services to check selinux status - add avc for allowing dovecot to bind smtp port- add avc for openEuler- add allow systemd timedated to unlink etc link- rebuild selinux-policy with policycoreutils-3.1-5- add add-firewalld-fc.patch- add allow-systemd-hostnamed-and-logind-read-policy.patch- add allow-systemd_machined_t-delete-userdbd-runtime-sock.patch- add allow-systemd-machined-create-userdbd-runtime-sock-file.patch- add add_userman_access_run_dir.patch- update selinux- add patch Allow-systemd_logind_t-to-read-fixed-dist-device-BZ-.patch/bin/sh/bin/shobs-worker1640081563-aarch64-0020 165628800035.5-6.oe2203sandbox.pp/usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/generic-hardened-cc1 -fasynchronous-unwind-tables -fstack-clash-protectionobs://private/openEuler:22.03:LTS/standard_aarch64/43514a305394cc83111c8d7c9d8f47c4-selinux-policycpioxz2noarch-openEuler-linux-gnuuQ%*e ]utf-89008629041b948ffc68958390ad3bddb2e98e83d0f7fedead893467b00287dbf94c9c5abacaa4770b2c9b9b191a5abb2a6b3ef67341459ff9c6b8b7e8aed0c8c?7zXZ !#,X ] b2u Q{LT/9cQ*^$ؿ$Ojژc'5N$쪔}V痜mȏrيt+əR K. `!HB VK -9wД>ݎaȓd|U'R&| XG>ԅm6W9״q(^h{)vTLߦT]zt*{;7=z{LpܒtM!Dֺ [%g$JCI4qOnq?ZQ$eG?QWgF21Qݩ&S_2YNXst;<>j"LߨTM'X 'j~q,!F޿~&bQ=>sN@Z<23|dX;gog_## F(s87|cَr~z$"wAnul>9-\$olW ʯ U^Vٱ́? Dd6ha/ dzG 9(!gd)W&lbT=`fQ=c ڄzoRŁpz[R!3>QQb;rfI=j;[_~FΛMsH ^:.Ѐ2gvw]E6}7nB.Xa7M D7cA>p0K0'mjǏP\D9 +ǯ蝱Vc>~4FZљ28eGj4d'w@9HiꪼDCwgn$$Њ3-%!uc7 ו bX.$;ݸAaʡ%O&?/",8' >54]-EhPXxwzoyM, vM?;T*QA s`1yg1rbrf[էbj'遈p<\Mi@ж8ʴ=9#xAhb¶ϋ  hF? Y˗>c'T `dcRY8q>@Z{o2E5dB<>TtY?[ӀYB ;RV T@DȱBvw- ɿ x<۵MW [kV[.s`ׁ5jˬyŰ4\üڂsc1S!Ior.ZCfw~D)H0fΏjЏP=D.cX"8gnNMxַI|y@ ^鿖Y"~^2lZM1+@ƻGPt;ZCىTg޽S3ʲ31y|O4%gRF ;`!#Y7b`B'ʓ^4ttVh]I"744<(wHךb)>'+xcDp$z\Zh Ni-dz<['!3cbRQŤLNj-bz9xWoe 3y p\sTZv8M)4㲮0Kԛ#??5DQ퀟 ڥ$c M4o6-Ge5=QY"CoQ|O\ phՒѕZ[ތ#;zu&rj#跺iLP|[@K]jX> \.;TYYz$/"u@'.2b6Tv:k}%yCdXZ@9qBkFѕY[0j|/Gc&Ǔc<%-< j]#m KĭBƈI m!LGTFڧ?+fIBjЊo-.G>4iٚ$bL}}Gi; ?)aB\Ʈbgh1L6I]x Q<~QnB!+;>[->1(Ľ:{ gT0w0[*vLC|)}\czkVOID<@d<e3M/V_c:_.AJz4x3; ~b[$;Iؤ1K2flw]Mr+:,R_ML>B,=J.hQFզA9 (D0 fe5x,xא@ աalF0/kz<Ů'd1JF\3pcv)7t3H`F\ &0bG )4{S۲#}Z{ߤiBl٢<*B]2p@ʐ GjD Cd.{Jj C))/j!(+1A*,@# As>VxTzsвcS+%T$bvOx 3~$fSc!WVf8:Y@Ghh!:}EfRW~L08)\2T6K/ *h寚8-8 ~M^PwvyO0K} bL>oDؔ}@gQKSr_ݻo QAty-[ۨE.Lf~r<>ſſIOnBž|>(+ۭbr?ƁGɠ^mq}U/ۼ] nd.Z-Sf|&,dlH=GQпB+2^C>IbElֻu&kZ֧(u=Y#cKojޙEww\f俕) Rt 56g  .ws1 B?yj Q}8/諜%7g*an78TMBzŖn@|?XJ6.M ͘lQ cJcSf,UPf!(v;^RB?k/wZ7Tc1E|J "M9~~'~p^yv&YN$ühfm"^߬sl}iߡiIu01ҜA0~tX?g=2S_2VkCXpa2X*I}6$0 D~IkO03d8a Tz0HRtDt*]`@2T Xs3WTpDKkj2q@mma;xjQ_R.eNȷ{Z"<7g"-gRzD ~_/ܪKT&9k],EqMp9aÂ.ԯKh3ĵEfTiY0.`7zjp\(y3@rks0Ua?VOVMkAd!yTA*P^:NDZbKH(0X B_1uKi-d5h^nزgoF)po/0=b)g:t{yG ě%,|_leB|D*kh`xeeBCNr#78MĴ٧[}F6ԞfyZCѐ^z?; P. яgqx4 I{w]YØDɻw1w:}ڡ6)BRCo~;(8Vk:T7r0I./,tW8B>ǟe6H 2{݀WrBEۀQhM=O A-Ɂ u T6iZ,*Kصps(_?fRԗG9{$ .<?\?~B'2 3WcB]&䒒L#,(<`f,ʊ-I α(>t$Rm7֚7@V]M:ͱgAU6 | Mvqz> ^2F= 2$)7eV9ˬ?LץT(K;#34ūGpɹg4Yk~ BԱj YZ